Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Securing and Controlling Cisco RoutersSecuring and Controlling Cisco Routers

Securing and Controlling Cisco Routers2002

Peter T. Davis

About this book

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Details

First published
2002
OL Work ID
OL3366463W

Subjects

Computer TechnologyNonfictionVendor SpecificNetworkingSecuriteComputer networksCOMPUTERSData Transmission SystemsMesuresRouters (Computer networks)Reseaux d'ordinateursRouteurs (Reseaux d'ordinateurs)GeneralSecurity measuresComputer networks, security measuresRouteurs (Réseaux d'ordinateurs)Réseaux d'ordinateursSécurité

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.